[1]
M. Shukla and S. Sharma, “A Comparative Study of Existing Data Mining Techniques for Phishing Detection”, Int. J. Comp. Sci. Eng., vol. 5, no. 5, pp. 182–187, Nov. 2025.